Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-01-2025 21:28

General

  • Target

    29e870507f65136b06f3609c86c396ffa7f0d1b4d5c9576140cf285c42bfdad6.exe

  • Size

    165KB

  • MD5

    de3e45ddc99ced0bf53edca442147648

  • SHA1

    545426c5bfa80d4156c86217528612632686b3d9

  • SHA256

    29e870507f65136b06f3609c86c396ffa7f0d1b4d5c9576140cf285c42bfdad6

  • SHA512

    cebbe25862e947ccf8f89cd69a9e0f36348ac36efb0aee8b59dcd360245dcf0368c024190fad7699c002963dac5289953e61ba3aab9219c934ac9182f9164262

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTBHfiP3zHLe4pWHlPEXZzjUq3th5f6utM5vLNinVmWvMu0bD:fny1tEULVWHIjN3tj6qnv0b2UrXkbvLu

Malware Config

Signatures

  • Renames multiple (2792) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\29e870507f65136b06f3609c86c396ffa7f0d1b4d5c9576140cf285c42bfdad6.exe
    "C:\Users\Admin\AppData\Local\Temp\29e870507f65136b06f3609c86c396ffa7f0d1b4d5c9576140cf285c42bfdad6.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2780

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-312935884-697965778-3955649944-1000\desktop.ini.tmp

    Filesize

    166KB

    MD5

    23e1ff2c690d1558852aa534ae2a1b49

    SHA1

    76525b80a08749f9791237e9566b82be3113daef

    SHA256

    ad1c6064923fc38b5ce9b386503e38698892c009462d06fc68fbfb66e9bd98cc

    SHA512

    772ee450d510142e3add86ac42c8f5af5b32a27ccb081be4fffbe258a9f72100d9201bf1156598c6c4a1601e158842c0c8b96b151f1e79463428f25dbc1caad3

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    174KB

    MD5

    6950aa6805d3cdcc7c86d2e685c4f184

    SHA1

    51f0cdd3a68eb5cc5755a17eeadcf776b22d0dc9

    SHA256

    20f89cd564a7f81ab472f252f2c307c39bb8ec1a6397494814d19e049b93c671

    SHA512

    bdaa5cd45bb2a22c0653f17766ff6a2dc2a9d0368d4a3ca52a1a8c0658e865109a67cb4c20a2a992bcf03fd1e233aac45d79a121445d2666243deaad9db23595

  • memory/2780-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2780-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB